infojet

<<<   <<>>

See the links below for current IT Alerts and useful user Tips/guides

US-CERT/NCAS(National Cyber Awareness System) Main Page

CERT Vulnerability Notes Database at the Carnegie Mellon University Software Engineering Institute







NATIONAL VULNERABILITY DATABASE-NIST

NVD Dashboard

CWE-Common Weakness Enumeration-Mitre

National Security Agency (NSA)-Cybersecurity

Mitre ATT&CK Framework

OWASP web app security checker

US-CERT/NCAS(National Cyber Awareness System) Main Page

CISA Cybersecurity-Combating Cybercrime

CISA Cyber Eessentials

CISA National Cyber Awareness System (NCAS)



NIST SMALL BUSINESS CYBERSECURITY CORNER

CISA - Resources for Small and Midsize Businesses (SMB)

US Small Business Administration (SBA) Cybersecurity for Small Businesses(training)



US Small Business Administration (SBA) Cybersecurity for Small Businesses(training)(direct)



US SBA Cybersecurity resources



FINRA cyber security







SEC cyber security





CISA main (US-CERT-computer emergency readiness team)





Ready.gov (Cyber security)





US Secret Service Cyber security investigations





FTC cyber security







FTC Cyber security for Small Business





US Dept. of Commerce, Cyber security for Small Business-10 tips







US FCC Small business cyber security



















Palo Alto Networks (Enterprise Security)



PurpleSec cybersecurity

ATT Cybersecurity



PurpleSec cybersecurity

Cisco Cybersecurity



















CERT Recently Published Vulnerability Notes
CERT publishes vulnerability advisories called "Vulnerability Notes." Vulnerability Notes include summaries, technical details, remediation information, and lists of affected vendors. Many vulnerability notes are the result of private coordination and disclosure efforts.
Last updated 2024-01-31T20:22:42.203315+00:00
Recent Vulnerabilities
DHS National Cyber Security Division_US Cert_National Vulnerability Database (Search form)

(1) VU#446598: GPU kernel implementations susceptible to memory leak
(2) VU#302671: SMTP end-of-data uncertainty can be abused to spoof emails and bypass policies
(3) VU#132380: Vulnerabilities in EDK2 NetworkPkg IP stack implementation.
(4) VU#811862: Image files in UEFI can be abused to modify boot behavior
(5) VU#347067: Multiple BGP implementations are vulnerable to improperly formatted BGP updates
(6) VU#304455: Authentication Bypass in Tenda N300 Wireless N VDSL2 Modem Router
(7) VU#757109: Groupnotes Inc. Videostream Mac client allows for privilege escalation to root account
(8) VU#287122: Parsec Remote Desktop App is prone to a local elevation of privilege due to a logical flaw in its code integrity verification process
(9) VU#127587: Python Parsing Error Enabling Bypass CVE-2023-24329
(10) VU#947701: Freewill Solutions IFIS new trading web application vulnerable to unauthenticated remote code execution





Tweets by @USCERT_gov



Search the NIST NVD for Vulnerabilities
Enter vendor, software, or keyword or press Go without entering any search terms to get all recent vulnerabilies from any vendor


WordPress specific vulnerabilities in NIST NVD

Drupal specific vulnerabilities in NIST NVD







INFOJET HOME



FBI Internet Crime Complaint Center (IC3.gov)(file an Internet crime complaint Online)

US-CERT DHC Homepage

FBI

DHS(US Dept of Homeland Security)